Академический Документы
Профессиональный Документы
Культура Документы
akamai.com
IPV 4
exhaustion and
IPV 6
adoption
= elements driving
IPV 6
attack vectors
= transition vulnerabilities
IPV 6
Figure 1: NTP reflection successfully targeted an IPV6 machine in our lab behind a shared router
Figure 2: Spoofed traffic was successfully routed to an IPV6 host via an ISP
6 / [The State of the Internet] / Security (Q1 2015)
= local-link attacks
= about stateoftheinternet.com